78
NAVAL POSTGRADUATE SCHOOL Monterey, California AD-A246 289 DT E L Ec-r " THESIS SELECTION AND SPECIFICATION OF A DATA LINK PROTOCOL FOR VSAT BASED INTER-LAN COMMUNICATIONS by Eugene S. Benvenutti, Jr. September, 1991 Thesis Advisor: G.M. Lundy Approved for public release; distribution is unlimited. 92-03476 92 2 11 074

NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

NAVAL POSTGRADUATE SCHOOLMonterey, California

AD-A246 289

DTE L Ec-r "

THESIS

SELECTION AND SPECIFICATION OF ADATA LINK PROTOCOL FOR VSAT BASED

INTER-LAN COMMUNICATIONS

by

Eugene S. Benvenutti, Jr.

September, 1991

Thesis Advisor: G.M. Lundy

Approved for public release; distribution is unlimited.

92-03476

92 2 11 074

Page 2: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

UnclassifiedSecurity Classification of this page

REPORT DOCUMENTATION PAGE1 a Report Security Classification Unclassified l b Restrictive Markings2a Security Classification Authority 3 Distribution Availability of Report2b Declassification/Downgrading Schedule Approved for public release; distribution is unlimited.4 Performing Organization Report Number(s) 5 Monitoring Organization Report Number(s)6a Name of Performing Organization I 6b Office Symbol 7a Name of Monitoring OrganizationNaval Postgraduate School (If Applicable) 39 Naval Postgraduate School6c Address (city, state, and ZIP code) 7 b Address (city, state, and ZIP code)Monterey, CA 93943-5000 Monterey, CA 93943-50008a Name of Funding/Sponsoring Organization 8b Office Symbol 9 Procurement Instrument Identification Number

I(If Applicable)8c Address (city, state, and ZIP code) 10 Source of Funding Numbers

__P Elanen Numb I Proj No as: N Work Unit Accion No11 Title (Include Security Classifcation) Selection and Specification of a Data Link Protocol for VSAT Based Inter-LAN Communications12 Personal Author(s) Benvenutti, Eugene S.13a Type of Report 13b Time Covered 14 Date of Report (year, monthday) 15 PwgpeCountMaster's Thesis I From To 1991 September16 Supplementary Notation le views expressed in this thesis are those of the author and do not reflect the officialpolicy or position of the Department of Defense or the U.S. Government.17 Cosati Codes 18 Subject Terms (continue on reverse if necessary and identify by block number)

Field Group Subgroup VSAT, LAN, Data Link Protocol, Systems of Communicating Machines. Specification

19 Abstract (continue on reverse if necessary and identfy by block number

This thesis proposes an architecture for the development of inter-LAN communication across a VSATnetwork. The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, andframe assembler/disassembler. Each of these entities contains a finite state machine, predicate/action tables, andlocal variables.

A selective repeat, sliding window data link protocol for the VSAT architecture, the transmitter and receiver, isformally specified using the systems of communicating machines model. A partial analysis of the specifiedprotocol is performed using reachability diagrams.

20 Distribution/Availability of Abstract 21 Abstract Security Classification

1^1 unclassifiedlunlimited [ sameasreport [] DTICusers Unclassified22a Name of Responsible Individual 22b Telephone (Include Area code) 22c Office Symbol

G.M. Lundy (408) 646-2094 CS/LuDD FORM 1473, 84 MAR 83 APR edition may be used until exhausted security classification of this page

All other editions are obsolete Unclassified

i

Page 3: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

Approved for public release; distribution is unlimited.

Selection and Specification of a Data Link

Protocol for VSAT Based InLer-LAN Communications

by

Eugene S. Benvenutti, Jr.

Captain, United States Marine Corps

B.S., United States Naval Academy, 1985

Submitted in partial fulfillment

of the requirements for the degree of

MASTER OF SCIENCE IN SYSTEMS TECHNOLOGY

(SPACE SYSTEMS OPERATIONS)

from the

NAVAL POSTGRADUATE SCHOOL

September 1991

Author: ,

Eugene S. Benvenutti, Jr.

Approved by: ___________ ___/_

G.M. Lundy, The! dvisor

Tri T. H Second Reader

Rudolf Panholzer, Chairman, Space Systens Academic Group

ii

Page 4: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

ABSTRACT

This thesis proposes an architecture for the development of inter-LAN

communication across a VSAT network. The architecture of a VSAT node consists of

the entities node, bridge, buffer, transmitter, receiver, and frame assembler/dis-

assembler. Each of these entities contains a finite state machine, predicate/action tables,

and local variables. Entities communicate by reading from and writing to shared

variables.

A selective repeat, sliding window data link protocol for the VSAT architecture, the

transmitter and receiver, is formally specified using the systems of communicating

machines model. A partial analysis of the specified protocol is performed using

reachability diagrams.

Accession For

NTIS 02A&I

DTIC TAR 0UM&,cro-nced [

A11- I 1 b' t tone~~jitst ! sIC tl.

Miat sp'" 'MI

Page 5: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

TABLE OF CONTENTS

1. INTRODUCTION ............................................................................................... 1A. PURPOSE OF THESIS ............................................................................ 1B. OUTLINE OF CHAPTERS ................................................................. 2

II. COM M UNICATION NETW ORKS ................................................................. 3A. CLASSIFICATIONS OF NETW ORKS ................................................ 3

1. Geographical Coverage ............................................................... 42. Topology ..................................................................................... 53. Switching Technique ................................................................... 5

B. NETW ORK ARCHITECTURE .......................................................... 11C. THE OSI M ODEL .............................................................................. 12

1. The Physical Layer ...................................................................... 132. The Data Link Layer .................................................................... 133. The Network Layer ...................................................................... 154. The Transport Layer ................................................................... 155. The Session Layer ........................................................................ 166. The Presentation Layer ............................................................... 167. The Application Layer ................................................................. 16

D. LOCAL AREA NETW ORKS ............................................................... 161. CSM AICD ................................................................................... 182. Token Bus ................................................................................... 213. Token Ring ................................................................................. 22

E. SCM SPECIFICATION OF CSMA/CD ................................................ 23III. VSATs AND THEIR USES ............................................................................. 26

A. VSAT SYSTEM COMPONENTS ...................................................... 261. Hub .............................................................................................. 262. Satellite ....................................................................................... 273. VSAT .......................................................................................... 28

B. VSAT USES ....................................................................................... 28C. ADVANTAGES OF VSAT SYSTEM S ................................................ 30

1. Service .......................................................................................... 302. Network Flexibility ...................................................................... 313. Cost Comparison .......................................................................... 31

D. VSATs AS A BRIDGE BETW EEN LANs ........................................... 321. Logical Composition of the VSAT ............................................. 332. Logical Composition of Hub ......................................................... 36

IV. SELECTION OF A MEDIUM ACCESS CONTROL PROTOCOL ................ 38A. GENERAL TDM A .............................................................................. 38B. RANDOM ACCESS PROTOCOLS .................................................... 40

1. ALOHA ........................................................................................ 41

iv

Page 6: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

2. S-ALOHA................................................................ 443. SREJ-ALOHA ........................................................... 454. Instability of ALOHA Protocols........................................ 47

C. DAMA.......................................................................... 471. Decentralized Schemes.................................................. 472. Centralized Schemes..................................................... 49

D. SELECTING AN ACCESS PROTOCOL ................................... 50E. MAC PROTOCOL SELECTED.............................................. 52

V. SPECIFICATION AND ANALYSIS OF A SELECTIVE REPEATPROTOCOL ............................................................................ 53

A. SPECIFICATION.............................................................. 551. Transmitter............................................................... 552. Receiver .................................................................. 593. Frame Assembler-Disassembler ........................................ 61

B. ANALYSIS..................................................................... 61VI. CONCLUSIONS ....................................................................... 67REFERENCES .............................................................................. 69BIBLIOGRAPHY ........................................................................... 71INITIAL DISTRIBUTION LIST........................................................... 72

Page 7: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

I. INTRODUCTION

The past twenty five years has seen rapid changes in the technologies of computers

and communications. As computers have proliferated, the need to economically connect

geographically distant computing resources has increased. Terrestrial private lines have

been the primary means to interconnect computers in the past. Unfortunately, these lines

offer poor to moderate reliability and limited flexibility. While the costs for these lines

have been rising, innovations in satellite communication technology have made data

communications using low cost very small aperture terminals (VSAT) a viable

alternative.

A. PURPOSE OF THESIS

The intent of this thesis is to develop a formal specification for communication

between local area networks (LANs) using VSAT terminals as a bridge. The

specification will cover LANs that adhere to the Institute for Electrical and Electronic

Engineers (IEEE) Standard 802.3 for carrier sense multiple access with collision

detection (CSMA/CD). The Open System Interconnection (OSI) reference model is used

as a basis for examining the lowest two layers of the VSAT network. Alternatives for a

data link protocol are examined and a recommendation given. A selective repeat

protocol for this layer is then specified and an analysis is performed. The specification

of the data link layer protocol is based upon the system of communicating machines

(SCM) proposed by Lundy and Miller [Ref. 11. It is expected that the VSAT bridge

specified using this model may be easily modified to accommodate communications

between other LAN standards, such as the token ring and token bus LANs.

Page 8: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

B. OUTLINE OF CHAPTERS

Chapter II discusses computer networks and protocols. It uses as a framework the

OSI model for communication networks. Each layer of the OSI model is briefly

discussed, with the lower layers emphasized. It then looks at LANs specified by the

IEEE 802 series standards.

Chapter III looks at current corporate VSAT applications and the components of a

VSAT network. An architecture for the VSAT based interconnection of remote LANs is

introduced. Advantages and disadvantages of VSAT based LAN internetworks are

discussed.

Chapter IV examines issues relating to the data link layer of a VSAT network such

the nature of network traffic, required throughput, and allowable delay. Several

candidate protocols are analyzed and a recommendation made for the network of LANs.

Finally, Chapter V will specify the data link protocol using the SCM model and

perform an analysis to ensure that it is free from deadlock. Conclusions and

recommendations for further study will be contained in Chapter VI.

2

Page 9: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

H. COMMUNICATION NETWORKS

If two devices wish to share information or pass data, there must be a

communication path between them. Sometimes it is practical to establish a direct point-

to-point link between the two devices, or hosts, but what if we need to communicate

between more than a single pair of hosts? If faced with running direct lines between

more than a very few hosts the task becomes imposing. If we need to connect N hosts

then the number of lines required is:N(N-1)

2

Communication networks offer a way around this problem. If an application a running

on a host A has data to send to an application b on host B, with access to a common

network, A passes the information to the network software resident in the same machine.

The network is now responsible for ensuring that this information is now sent from node

to node until it reaches host B. The network software on this host then passes the data to

application b. [Ref. 4:p. 193-195]

This chapter will introduce the methods of classification for communications

networks. It will then examine network architectures and discuss the Open System

Interconnection model for computer networks. Finally we will take a more detailed look

at the various types of Local Area Networks (LANs).

A. CLASSIFICATIONS OF NETWORKS

Communication networks may be categorized by three different criteria: their size,

their shape, and their method for routing information from node to node.

3

Page 10: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

1. Geographical Coverage

In classifying a network by geographical coverage we are essentially looking at

its "footprint." By the size of this footprint we may classify the network as either a Local

Area Network (LAN), Metropolitan Area Network (MAN), or Wide Area Network

(WAN). Knowledge of network size may also give us insight into the technology used.

For example, it would be rare indeed for a network of computers in the same building to

use microwave relays as a means to exchange data!

a) LAN

LANs are computer networks that occupy a size on the order of a college

campus or smaller. They usually use twisted pair or coaxial cable as their connecting

medium, though the use of optical fiber is becoming more widespread, and offer data

rates of from 1 to 100 Mbps. Because of their relatively small size and simplified routing

schemes, LANs do not require all of the layers of software that larger networks do.

There are several different standards for LANs. These will be discussed in a later

section.

b) MAN

MANs are about the size of a city as the name implies. They use a

combination of connecting mediums from coaxial cable to microwave relay. An

example of a common MAN is a cable TV system. The only currently formalized

standard for computer MANs is IEEE standard 802.6. This standard, known as

Distributed Queue Dual Bus (DQDB), will allow network lengths of up to 50 km and

data rates of 45 to 150 Mbps across an optical fiber medium.

c) WAN

WANs are the largest and most complex of all networks. These networks

rely on satellite communication, terrestrial microwave, and long haul leased data lines as

4

Page 11: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

their communication media. Data rates currently range from 50 kbps to 1.544 Mbps with

data rates of 45 to 155 Mbps projected for the near future. The international telephone

network is an example of a WAN. Many layers of software are needed to handle

complexities such as routing, congestion, error and flow control across the WAN. Also,

some WANs are an aggregation of many smaller networks. In this case an additional

layer of software must handle the difficulties of moving data between the different

networks, or internetworking. Most of these software layers are described in the OSI

network architecture described later.

2. Topology

While geographical coverage classified networks by their size, topology

classifies them by their shape. If we look at the connections between nodes on a network

we may see a pattern. This pattern is the topology. Topology can be described as five

different "shapes": fully connected, ring, star, bus, and tree. If a network does not fit into

any of these categories then it is classified as "irregular." All of these topologies except

the bus are a series of point-to-point links that allow information to be routed from one

node to another until it reaches its destination. The bus topology is different in that every

node can talk directly to every other node through the use of a shared data "bus." Figure

1 graphically shows the six different topologies.

3. Switching Technique

Switching classifies networks by the manner in which data is routed from the

sender to the receiver. Devices at each node take data off of incoming channels and

place it on the appropriate outgoing channel as determined by software algorithms. The

data is thus switched from node to node until it reaches its destination. [Ref. 4:p. 1961

5

Page 12: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

RING FULLY CONNECTED

STAR IRREGULAR

BUS TREE

Figure 1: Network Topologies

Page 13: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

a) Broadcast Networks

Broadcast networks use the simplest possible switching: data is passed

directly from sending to receiving node via a shared communications medium so

transmissions by one node are received by all. Examples of this type of network are

packet radio networks, satellite networks, and LANs. [Ref. 4:p. 207]

Sharing a communication medium raises problems that must be solved by

software. If two hosts transmit simultaneously, a collision occurs and neither message

gets through. A method to control access to the transmission medium is necessary to

minimize collision and to resolve collisions successfully when they occur. This layer of

software, called the medium access control (MAC), resides in the data link layer of the

OSI architecture and will be discussed in detail in Chapter IV.

b) Circuit Switching

Circuit switching establishes a dedicated path between two hosts that wish

to communicate. Because a connection must be established prior to the transmission of

data, this type of switching is known as connection oriented. This path is a series of

links from node to node that lead from the sending node to the receiving node and is in

place for the duration of data transfer session. The public phone system is an example of

a circuit switched network. [Ref. 4:p. 197]

There are three distinct phases to a data transfer session on a circuit

switched network. The first phase, circuit establishment, sets up an end-to-end circuit.

The initiating station ties into its node and requests a connection to the receiving station.

This node determines the next link in the chain based upon routing algorithms and

availability and sends a request for a channel to that node. Once that is done the two

lines are "patched" together. This proceeds until the node that the destination station is

attached to is reached. If the receiver is available, the sender is notified and the data

7

Page 14: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

transfer phase begins. After the exchange of data is complete, the circuit disconnect

phase is initiated by one of the two hosts. This frees the allocated resources for use by

other calls. [Ref. 4:p. 197-198]

Circuit switching is advantageous because it allows the continuous

exchange of data such as voice across a network in a manner that is transparent to the

user at either end, but it has some major drawbacks. First, both sender and receiver must

be prepared for the data exchange. If the receiver is not ready, the sender gets a busy

signal and must try again later. The time taken to set up the circuit is wasted and must be

done again when the sender calls back. The second major drawback is that circuit

switching wastes capacity. Even if there is no data being transmitted, the circuit is

reserved for use by the two parties involved.

c) Message Switching

Message switching avoids wasting capacity in the manner of circuit

switching. This method of switching works much like the postal system. If you wish to

send a letter to a friend, you put the letter in an envelope and give it to your postman. It

doesn't matter if your friend is ready to read it or even if he's home at that time.

Similarly, if a station has information to send, such as a large data file, it places a

network address on it and passes the entire package to the network node. The node looks

at the address, consults its routing algorithm, and sends it on to the next node. No direct

link is established, so this is connectionless service. Eventually the message will reach a

node to which the destination is attached and be delivered. If traffic between two nodes

on the path is heavy, the message can be rerouted or stored by a node until it can be sent.

The primary disadvantage of message switching is that it is unsuitable for real-time data.

[Ref. 4:p. 198-201]

8

Page 15: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

d) Packet Switching

Packet switching performs similarly to message switching except that large

messages must be broken down into smaller fixed-length packets of a few thousand bits.

Each of these packets is individually addressed and transmitted. As these packets are

passed to the network they may be handled in two ways. The first is referred to as

datagram packet switching. This procedure treats each packet as an independent

message that may take a different route to its destination. Because packets do not follow

one behind another they may arrive at their destination in the wrong order. To enable the

receiving station to reassemble the packets into a coherent message, the sending station

tags each packet with a sequence number. Datagram service is connectionless.

[Ref. 4:p. 201-2021 [Ref. 3:p. 88-891

The second approach to packet switching establishes a logical connection,

or virtual circuit, between the sender and receiver. This method, a connection oriented

service, is very similar to circuit switching in that the three phases are the same. The

route must be determined and the receiver must be ready, the data must be transferred,

and the connection must be terminated. The difference is that with virtual circuits, the

links from node to node are not dedicated. Instead, each packet is given a label that

corresponds to the virtual circuit it is using. The nodes take each packet and place it in a

queue for the appropriate link. Because the circuit is established in advance, nodes are

not required to make a routing decision for each packet, thus reducing their load. Also,

since every packet follows the same path through the network, the receiver is ensured of

getting them in the proper order. [Ref. 4:p. 202-2031

Figure 2 based on diagrams in [Ref. 3:p. 881 and [Ref. 4:p. 2041 depicts the

relative performance of the above switching techniques.

9

Page 16: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

iI //\\ °. .-.

\\- ,!- \\\\//-/ -

. . . . I .

II\0/ / 0" -N (~i o

/°I. /U

- .

f-. t-. 1-

Page 17: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

B. NETWORK ARCHITECTURE

A designer faced with the task of designing and implementing a computer network

from the top down would probably be overwhelmed by the magnitude of the task.

Fortunately, standard architectures have been developed that greatly simplify the matter.

These architectures divide the communication process into functional "layers." Each

layer offers a group of "services" to the layer directly above while hiding from them the

implementation details. The rules that govern the functionality of an architectural level

is its protocol. The architecture specification provides details that allow implementers to

build hardware and write programs that obey the protocol of the level for which it is

meant. [Ref. 3:p. 9-11]

Physically, there is an interface between each pair of levels that allow a level to take

data from the level directly above, add some control information that is particular to the

protocol, and pass this to the layer directly below. This process continues until the

information is in a form suitable for transmission across the physical medium. At the

receiver the reverse process is carried out. Data packets come up from the layer below,

protocol specific information is stripped and any necessary actions performed, and what

remains is passed up the chain.

Because the implementation details of lower levels are hidden from higher levels,

level n on machine A carries on a conversation with level n on machine B. These are

known as peer processes. Logically, all communications are from peer to peer

[Ref. 3:p. 10]. Figure 3 illustrates the relationships in a four layer architecture.

Several organizations have put forward standards for network architectures. The

three most prominent of these are the International Organization for Standardization

(ISO), the Institute of Electrical and Electronic Engineers (IEEE), and the United States

11

Page 18: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

MACHINE A MACHINE B

LAYER4LYR

Layer 1 Protocol

LAYER LAYER

I TRANSMISSION MEDIUM

Figure 3: Relationships In A Four Layered Architecture. Source: [Ref. 2:p. 101

Department of Defense (DoD). The IEEE standards are the de facto standards for LANs,

while the OSI architecture is gaining growing recognition as an international standard.

As such, we will only concern ourselves with these two.

C. THE OSI MODEL

The ISO network architecture is known as the ISO Open Systems Interconnection

Reference Model and is commonly referred to as the OSI model. This model is a

hierarchy of seven layers: physical, data link, network, transport, session, presentation,

and application. The designers of this reference model created layers such that each layer

12

Page 19: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

contains functions that are manifestly different in process and technology or where a

different level of data abstraction exists; yet they attempted to keep the model from

having too many layers and becoming unwieldy. Required interactions across boundaries

were minimized as much as possible. Also, a prime consideration was to keep changes

made in one layer from affecting the layers above or below it. [Ref. 4:p. 391]:

These layers function as described above with each taking "data" from the layer

above, encapsulating it, and passing it on to the next layer below. Figure 4 depicts the

seven layers and their interaction. The following sections will look at the lowest four

levels in some detail. The upper three levels will briefly have their services described.

1. The Physical Layer

The physical layer is responsible for moving bits from point A to point B.

Typical issues dealt with at this level are bit representations and timings, modulation

methods, and physical connections. The ultimate goal of this level is to ensure that there

is a viable path over which bits can be passed.

2. The Data Link Layer

This layer is responsible for taking error prone transmissions from the physical

layer and making them appear error free to the layers above. To accomplish this, the

data link layer forces the sender to divide information into fixed size packets. It then

takes these packets and encapsulates them with header and trailer information, called a

frame, that allows the data link entity in the receiving machine to determine if a packet

was received correctly or in error. Implicit or explicit acknowledgments allow the sender

to know what packets have been received correctly and which need to be retransmitted.

13

Page 20: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

Frame Construction Frame Reduction

Appli nX . .......................... .......... caonY

Alcaion i~cationI A , - I . ...................... ,H~aa ......... ppiato

Pr ention . .................. a ....... . P nation

i n . ............... a ....... . ionTrnpr ij -.......--.... at ....... .r ansorN rk . ....... .NH Da ....... t rk

DtLikF A C Data FCS DataLi1i l Bi- its- i

Transmission Medium

Figure 4: OSI Operation. Source: [Ref. 5:p. 391]

Another function of the data link layer is point-to-point flow control. If a

sender is transmitting packets faster than the receiver can handle them, the receivers

buffers quickly become full, and data frames are lost. The lost frames must be

retransmitted thus adding to the quantity of packets that the receiver is trying to handle

and pushing it farther behind. The data link layer is responsible for ensuring that this

14

Page 21: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

does not happen. This is usually accomplished through the use of a "window" that allows

a sender to have only a certain number of unacknowledged frames outstanding at any

time. If a sender has transmitted a full window, then he must wait for an

acknowledgment from the receiver before continuing. This allows the receiver to control

the flow of data by withholding acknowledgments.

3. The Network Layer

The network layer is concerned with routing of packets, congestion control

across a network, and internetwork issues if packets are to move from one network to

another. Routing may be either predetermined through the use of tables or dynamic,

adapting to the current conditions of the network. If too many packets are following

similar routes, bottlenecks may occur. The network layer must ensure not only that

packets avoid any existing bottlenecks, but also that the bottleneck itself is removed.

Finally, this layer must resolve issues that arise when a message must pass out of the

boundaries of one network and into another. These networks may use dissimilar

addressing schemes and even entire different sets of protocols. The network layer must

handle this transition smoothly and transparently. [Ref. 3:p. 16]

4. The Transport Layer

The transport layer is the first end-to-end protocol and creates a logical

connection between sender and receiver. Each of the layers discussed thus far have

operated in the various nodes of a network and have been concerned with point to point

links. The transport layer resides in the hosts and is concerned with host-to-host error

and flow control. It must take large data blocks passed to it by the session layer and

subdivide it into smaller packets acceptable to the network layer. It may take a data

stream from a single session layer entity and split it into many streams that are

transported across the network concurrently and reassemble them at the other end. By

15

Page 22: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

the same token, the transport entity may take data streams from several session entities

and multiplex them into a single data stream for the network to transmit.

Error and flow control are placed in this layer as well as the data link layer to

ensure a high quality of service to the user. Typically, the owner of a host does not own

the entire network to which it is attached. If service by the network is poor, the

transport layer may recover from it with little or no interruption to the higher levels.

[Ref. 3:p. 370-3731

5. The Session Layer

While the transport layer is responsible for creating logical a connection, the

session layer essentially provides a "user interface" to this basic service [Ref. 4:p. 522].

The basic services that are provided by this layer are session establishment and

maintenance, dialog management, and recovery from failures [Ref. 4:p. 398].

6. The Presentation Layer

The presentation layer handles problems relating to the conversion, encryption,

and compression of data [Ref. 3:p. 471]. It provides the syntax that is used between

communicating applications [Ref. 4:p. 3981

7. The Application Layer

This layer contains the actual user initiated programs, or applications, that are

run on the computer. The most common three are remote log on, file transfer, and

electronic mail transfer. [Ref. 3:p. 528]

D. LOCAL AREA NETWORKS

Because of their limited scale, LAN architectures generally omit the network layer.

Also, the data link layer of the OSI model has been subdivided into medium access

control (MAC) and logical link control (LLC) sublayers.

16

Page 23: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

LANs are logically broadcast networks. Some method for controlling access to the

shared transmission medium must be established. This is accomplished in the MAC

sublayer by either contention or by token passing. Contention protocols allow every

node on the network to vie directly for idle time. If two or more nodes transmit

simultaneously, then a collision is said to have occurred. A contention based MAC layer

protocol should provide a fair and predictable method for minimizing these collisions and

correcting them when they occur.

Token passing protocols avoid the problem of contention by allowing only one

station to transmit at any time. This is accomplished by a special frame that is passed

from node to node called a token. There is generally only one token per network and

only the current holder of the token is allowed to transmit. Algorithms within the

protocol must prevent one station from holding the token indefinitely.

The LLC sublayer sits on top of the MAC sublayer and provides a common interface

to higher layers regardless of the MAC that lies beneath. The essence of this layer is a

header field that is added to data packets that are sent down. This header gives source

and destination addresses as well as control information. [Ref. 3:p. 265]

The IEEE 802 committee has put forward standards for three types of copper

connected LANs. Standard 802.2 covers the LLC sublayer while 802.3 through 802.5

cover the physical layers and medium access control sublayers for carrier sense multiple

access with collision detection (CSMA/CD), token bus, and token ring LANs. These

standards have been adopted by the ISO as ISO 8802. Token ring and CSMA/CD are the

predominant LANs in offices while token bus is chiefly u ,sed for real-time applications in

industry. The following section will look at the MAC sublayer these three LAN

standards.

17

Page 24: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

1. CSMA/CD

This is by far the most common access technique for LANs. It is a broadcast

network that was originally developed in the mid 1970's at Xerox as part of their

Ethernet LAN and is sometimes (inaccurately) referred to by that name [Ref. 4:p. 349].

The EEEE standard describes a family of CSMA/CD systems that operate at data rates of

from I to 10 Mbps over a variety of media [Ref. 3 :p. 141].

Carrier sensing multiple access is a contention based protocol that can be

summed up by the phrase "listen before talk." Anyone that has tried to talk on a HAM or

CB radio knows that if you just pick up the microphone and start talking you might talk

over someone else, so no clear signal gets through. If you listen to make sure that the

channel is clear before you begin your transmission then you stand a better chance of

having it get through. If a collision occurs, the sender will wait a random time before

trying again. This minimizes the possibility that two stations will continue to collide on

subsequent tries. CSMA can be summarized as a four step algorithm:

1. Sense the medium to determine if another station is transmitting.

2. If a carrier is sensed, go to step 1.

3. Otherwise, begin transmitting message and send until it is completed.

4. Determine if a collision has occurred. If so, wait a random time and go to

step 1.

The problem with the pure CSMA algorithm is that a station transmits its entire

message before trying to find out if a collision has occurred. If a station continues to

sense the medium while it is transmitting then this waste can be avoided. If a collision is

detected, the sending stations stop their transmission and sends a short "jamming signal"

that allows all stations to know that there has been a collision [Ref. 4:p. 350]. The

CSMA/CD algorithm is thus:

18

Page 25: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

1. Sense the medium to determine if another station is transmitting.

2. If a carrier is sensed, go to step 1.

3. Otherwise, begin transmitting message while continuing to sense medium.

4. If a collision is detected, cease transmission of message and send jamming

signal. Go to step 1.

Figure 5 illustrates the frame structure for 802.3 networks. All octets within the

CSMA/CD frame, with the exception of the frame check sequence, are transmitted with

their low order bits first. The first part of the frame is the preamble field. This is a 7

byte field of alternating l's and 0's that allow the receiver's clock to synchronize with the

incoming frame timing. The second field is the start frame delimiter field. This field

holds the pattern 10101011 and indicates the actual start of the frame. [Ref. 6:p. 24]

The next two fields in the frame are address fields. These fields may be either 2

or 6 bytes in length and hold the destination address and source address respectively.

The choice of either 16 or 48 bit address must be consistent across the network but is left

as an implementation decision to the manufacturer. Figure 6 shows the format of both 16

and 48 bit address field formats. Each octet within the address fields are transmitted with

the least significant bit first. In the destination field the first bit is used to indicate an

individual or group address. If the bit is set to 0, then the field is an address for an

individual station on the network. A 1 indicates that the address is for a group of stations

on the network. If the 48 bit address is being used then the second bit indicates whether

an address is administered locally or globally. Local addresses are ones for a single LAN

while global addresses are those administered by the system administrator of several

interconnected LANs. [Ref. 6:p. 24-26]

19

Page 26: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

Bytes

7 Preamble

1 SFD Fields Transmitted Top

to-Bottom2 or 6 Destinaton Address

2 or 6 Source Address

2 Length

Variable Data

Variable Pad

4 FCS

[luS LII MSB

Bits Transmitted

Left-to-Right

Figure 5: CSMA/CD Frame Format.Source: [Ref. 6:p. 24]

The length field is a 2 bytes and its value indicates the number of bytes of data

that follows in the data field. This field is transmitted with the high order octet first.

[Ref. 6:p. 26]

The data field is where packets passed down by the LLC layer are contained.

Maximum sizes for the data field are specified by the particular implementation of the

CSMA/CD standard. Each implementation also specifies a minimum length for the

CSMA/CD frame. If the data field is not long enough, the pad field is used to fill out

the frune [Ref. 6:p. 26-27]. Daia field lengths range from 0 to 1500 octets while the pad

field may be 0 to 46. [Ref. 3:p. 1441

20

Page 27: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

48 Bit Address Format

W, I U/L 146 Bit Address

16 Bit Address Format

I/G 15 Bit Address ]

I/G 0 Individual AddressI/G I 1 Group Address

U/L =0 Globally Administered Address

U/L = 1 Locally Administered Address

Figure 6: CSMA/CD Address Field FormatSource: [Ref. 6:p. 25]

The final field in the CSMA/CD frame is the frame check sequence field. This

field contains a 32 bit cyclic redundancy check (CRC) value. This value allows the

receiver to check the incoming frame for bit errors. It is computed as a function of the

address fields, data field, and pad field. [Ref. 6:p. 27]

2. Token Bus

CSMA/CD's performance is probabalistic so the possibility exists that, under

heavy loads, a station may have to wait an arbitrarily long time before sending its traffic.

The token bus protocol (IEEE 802.4) alleviates this situation by allowing stations to take

turns. If there are n stations on the network and each is allowed to transmit for a

maximum of time T seconds, then a station is guaranteed of being able to send data at

least every nT seconds. Also, there is no method of prioritization built into the

CSMA/CD protocol which makes it unsuitable for some real-time factory automation

tasks. Data rates of 1, 5, and 10 Mbps are allowed. [Ref. 3:p. 148]

Token bus is a broadcast LAN in which the stations on the network form a

logical ring in which each station knows its predecessor and successor. The token is

21

Page 28: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

passed around this ring, allowing each station a chance to transmit. The protocol

specifies methods for adding and deleting stations from the ring and also recovery

mechanisms for multiple tokens or lost tokens. [Ref. 3:p. 148-153]

A priority scheme is specified which may be used to reserve a fraction of the

network's capacity for real-time data, such as voice. Low priority packets are sent only

when there is excess capacity. Priorities are defined as 6, 4, 2, and 0 with 6 being the

highest. A set of timers within each station determine how much of each type of data

may be transmitted while the token is held.

3. Token Ring

The token ring network (IEEE 802.5) is physically a series of point-to-point

links that form a circle. As packets are transmitted by a station, they are read one bit at a

time by the next station and placed onto the link to the following one. This continues

until the packet has returned to the originator, who takes it off of the network. Since

every station sees every message, this is logically a broadcast medium even though

physically it is otherwise. The 802.5 standard allows implementations of 1Mbps and 4

Mbps.

The basic token ring MAC protocol is very simple. It operates by continuously

circulatiig a three byte token around the ring. When a station has traffic to send it seizes

this token and changes the second byte to indicate that what follows is a data frame. It

then sends its data until completion. If the station needs to send more data after the first

frame, then it may do so as long as its token holding time has not expired. Once it has

completed its transmission it then releases a new token.

The 802.5 standard allows 8 levels of priority. The access control field in a

token ring frame gives the priority of a token. A station may "seize" a token and begin

transmitting if its data is of equal or higher priority than that in the access control field.

22

Page 29: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

For a data frame, the access control field serves as a reservation mechanism. When a

station transmits a frame, other stations may set the reservation bits in this field if their

traffic is of higher priority than that already there. When the station that sent the data

packet gets the access control field back and is ready to release a new token, it may set

the field to the priority of the reservation. Once the station that raised the priority has

finished, it releases a token that returns the priority to its original state. [Ref. 4:p. 357]

E. SCM SPECIFICATION OF CSMA/CD

While the CSMA/CD MAC protocol standard was written as Pascal procedures,

Lundy and Miller [Ref. 7] have devised an easily understood model for the CSMA/CD

protocol using systems of communicating machines(SCM). The model SCM combines

finite state machines, shared and local variables, and predicate-action pairs to describe a

system's states and behaviors.

Figure 7 shows the specification for a network node. State 0 is the initial state of the

system. From this state a node may transmit data if the local variable msg is not empty

and the shared variable medium is clear. If no collision occurs then the OK transition is

taken, returning the node to state 0. If there is a collision then the collision2 transition

takes the node to state 3 and from there back to state 0. The receive transition, finish, is

enabled when a message with the nodes address appears in the medium. Table 1 gives

predicate-actions for the network node. This model of a CSMA/CD node will be used as

an entity in a VSAT based LAN-LAN bridge. [Ref. 7:p. 7-10]

The CSMA/CD bus is modeled by the shared variable medium onto which packets

consisting of address and data fields are placed. The controller is responsible for

"cleaning" the contents of the bus periodically, thus modeling the ends where signals

23

Page 30: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

terminate. Figure 8 is a diagram of the controller and its shared variables. The

predicate-action table for the controller is given in Table 2. [Ref. 7:p. 7]

3 collision 2O

addr datamsg 7 inbuf

Figure 7: CSMA/CD Node and VariablesSource: [Ref. 7:p. 10]

TABLE 1: PREDICATE-ACTON TABLE FOR NODE. [Ref. 7:p. 8]

transition predicate actionXmit msg #k0 A medium = 0 medium msg;

______________Signal i) := tranceiveOK Signal(i) = clear msg = 0collisionO medium = garbage Signal(i) :=collision

collision2 mediwn= garbage A Signal(i) =clear Signal(i) :=collision

proceed Signal(i) = clearfinish medium.addr = i A Signal(i) = clear inbuf := medium .dataaccept I___________________ Signal(i) := tranceive

24

Page 31: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

0 2garbage

message

reset

addr data

medium Z1iX Signal L7J]Figure 8: Controller and Shared Variables. Source: [Ref. 7:p. 101

TABLE 2: PREDICATE-ACTION TABLE FOR CONTROLLER [Ref. 7:p. 10]

transition predicate actionmessage medium e {garbage,@)reset Signal(medium.addr) = tranceive medium := 0;

Signal(l..n) := cleargarbage medium = garbagedelete Signal(1..n) = collision Signal(1..n) := clear;

medium := 0

25

Page 32: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

Ill. VSATs AND THEIR USES

This chapter introduces VSATs. It reviews the components of a VSAT network, the

current uses for VSATs in corporate communications, and the advantages of VSAT-

based networks. The use of VSATs as a bridge between geographically dispersed LANs

is discussed and a potential system architecture for this use is proposed.

A. VSAT SYSTEM COMPONENTS

VSAT systems consist of three major components: a hub, the satellite, and the

VSATs themselves. These are usually configured as a star topology network. Messages

from the VSATs are sent over a channel shared either by time division multiple access

(TDMA) or frequency division multiple access (FDMA). These access methods allow

each VSAT to have all of the available bandwidth part of the time or part of the

bandwidth all of the time. TDMA schemes are more responsive to growing and

-hanging networks. More will bc said oflits different forms in Chapter IV.

Messages moving from the hub to the VSATs are transmitted over a single time

division multiplexed (TDM) channel. The distinction between TDMA and TDM is that

in the former, many stations are transmitting on a shared channel while in the latter only

one station is transmitting. VSATs listen to the entire TDM data stream but "grab" only

those packets addressed to it.

1. Hub

First, a hub with a large (4-8 m diameter) antenna and front end processor acts

as the central network control point and as the main data processor. It is generally

located at or near the central offices or corporate headquarters. Network management

functions such as protocol and frame changes, frequency and time slot assignment for

26

Page 33: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

remote stations, and addition of new stations to the network are accomplished from here.

Transmissions from the hub have data rates typically in the range of 56 to 256 kbps.

[Ref. 9]

Each hub is capable of handling several thousand VSATs. If a network is not

very large, then this huge capacity is not needed and a VSAT network with a dedicated

hub may not be economical due to the large initial investment necessary to establish the

hub. In order to make VSAT networks a viable alternative for smaller networks, many

VSAT vendors have established regional hubs that are shared by several corporate

networks. These hubs are owned and operated by the VSAT supplier and the capabilities

are "leased" by the users, alleviating the need for both the large capital investment and

the cost of a staff dedicated to running the hub.

2. Satellite

The second component is a communications satellite. These satellites are in a

geostationary orbit approximately 42,200 km above the equator. From this position, a

global coverage-beam is able to see 42% of the Earth's surface [Ref. 8:p. 3]. In order to

provide high gain for the coverage areas, multiple beams may be used [Ref. 10:p. 551.

The VSAT user leases a transponder in the appropriate coverage region, or a portion of

the transponder's bandwidth, from the VSAT provider. Stationkeeping and health and

welfare of all systems aboard the satellite are the responsibility of the satellite's owner.

To the users of VSATs, the satellite is a relay that takes in all signals on the uplink

frequency, shifts them to the downlink frequency, and then retransmits them. The most

notable characteristic of the satellite link is the added propagation delay. As a rule of

thumb, a signal will take 0.27 seconds to propagate from the sender to the receiver along

a single hop satellite link. If there are two hops between sender and receiver, such as

might be the case in a star network, then the delay is 0.54 seconds. If the sender is

27

Page 34: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

waiting for a response at the terminal, then he could only hope to see it at 1.08 seconds at

the earliest. While this delay may not be intolerable, it would certainly be an annoyance

to the user.

3. VSAT

Finally, the VSAT itself is a small (.8-2.4 m) antenna, an outdoor unit

consisting of a transmitter (1-5 Watt) and receiver, and an indoor unit with a modem,

encoder/decoder, multiplexer/demultiplexer, and digital data interface. The modular

design allows easy upgrades of system components and ensures transportability. Because

of the small antenna and low transmitter power, communications are normally limited to

VSAT-to-hub or hub-to-VSAT, though systems are available that allow VSAT-to-VSAT

messages. Data rates for iow-end VSATs typically range from 56 to 128 kbps.

B. VSAT USES

Frequency bands used in satellite communications are generally referred to by a

letter designation. This is a hold-over from World War II attempts to hide exact radar

frequencies from the enemy. Through the years the letter designations were declassified,

modified, and generally abused [Ref. 8:p. 181]. It is unknown whether this subterfuge

confus( our opponents, but it certainly causes difficulties for communication engineers

since there is no recognized standard. The two frequency bands of interest to VSAT

communication are the C and Ku bands. Generally, the C band of the radio frequency

spectrum is considered to range from 3.7 to 6.425 GHz while the Ku band extends from

10.7 to 18 GHz [Ref. 8:p. 212].

The first VSAT networks used C-band satellites for one way point-to-multipoint

communications. These early VSATs had antennas of 0.6 to 1.2 m and spread spectrum

technology in order to minimize interference with terrestrial microwave and adjacent

28

Page 35: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

satellites. The need for an interactive capability led to the introduction of two-way

VSATs using C-band, but these systems were limited to bit rates of around 9600 bps and

suffered from interference problems. Today, C-band VSATs are used by news

organizations and others that are primarily concerned with broadcasting information to

geographically dispersed locations [Ref. 91.

Most new VSAT data networks utilize Ku-band satellite channels. These are free

from ground-based microwave interference and offer a larger available bandwidth, hence

higher potential data rate. These networks have found a wide variety of uses in corporate

data communications:

o Point-of-sale information is gathered and transmitted to central computers for

order processing, credit authorization, and inventory control.

o Automatic teller machines are connected to the central office for transaction

approval and processing.

o Terminals are connected to a central data base for use in hotel and airline

reservation systems.

o Corporate teleconferencing and private phone systems.

o Broadcast of corporate training films and in-store audio/video advertisements

to branches.

Table 3 lists a few current networks for both C and Ku-bands.

29

Page 36: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

TABLE 3: CURRENT VSAT NETWORKS. SOURCE: [Ref. 9]

CORPORATION # OF VSATsAssociated Press 3200Dow Jones & Co. 2600Fanner's Insurance 2500Reuters 2000

C-BAND VSAT NETWORKS

CORPORATION #of VSATs USEChrysler 6000 Batch data, voice, video.

WalMart 2100 Batch data, voice, video.

Holiday Corp. 2000 Batch data, interactive reservationservice.

Merrill Lynch 2000 Video, voice, outbound data.

Xerox 1500 Service for time-sharing customers.

A.L. Williams 1200 Interactive data.

Ku-BAND VSAT NETWORKS

C. ADVANTAGES OF VSAT SYSTEMS

1. Service

Service on a VSAT network can be entirely controlled by the user. Installation

and testing of the new VSAT can be done by personnel in the using organization. In

order to integrate a new VSAT into a network, network management must make frame

changes that allow the new VSAT to access the link. This is done through commands

issued from the network hub, which is run by the using organization. There is no

outsideagency that must be dealt with in case there are changes that must be made to the

network.

If there are any difficulties with the service, the user is dependent upon the

leased line provider for tracking down and correcting the problem. Since the

30

Page 37: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

deregulation of the telephone system this is increasingly difficult. The local phone

system may blame the regional carrier, who can blame the next region, and so on until

the other end of the line is reached. Any disputes over service and billing must be

negotiated to the satisfaction of all parties. When difficulties crop up with a VSAT

network there are no disputes over who is at fault. The blame rests squarely with the

VSAT provider, allowing a rapid resolution.

Natural disasters such as earthquakes and unnatural ones such as a backhoe

slicing through a cable can wipe out communications paths on a terrestrial network.

VSAT networks are immune to this type of problem. Also, VSATs are capable of

providing a lower bit error rate than that of leased data lines.

2. Network Flexibility

Modifying a terrestrial network can be both costly and time consuming. In

order to add nodes, it is necessary to install leased lines to the site. The user has no direct

control over the installation an setup process because he is dependent upon an outside

agency for service. It is entirely possible that delays of weeks or months may be

encountered before service can be initiated. Installing or moving nodes on a VSAT

network is simple. All components are modular and easily transported to the site. The

installation procedure is simply erecting and pointing the antenna and attaching the

interface to the local network. Any necessary frame changes can be initiated from the

hub.

3. Cost Comparison

Leased line pricing usually uses a 1.544 Mbps line, or TI carrier, as a basis for

cost comparison. Price for a line increases as a function of distance and required bit rate.

A typical 1000 mile long TI link costs about $10,000 per month while a 500 mile TI

link runs about $6,000. If a full 1.544 Mbps is not needed, a fractional TI can be leased

31

Page 38: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

at rates of 384, 512, and 768 kbps. A 1,000 mile long 512 kbps line will cost

approximately $7,000 per month. These prices do not include the cost of any terminating

equipment and circuits needed ar either end of the line. [Ref. 1 l:p. 357-362]

Prices on VSAT remote sites range from $6,000 to $20,000. For small

networks of less than 200 remote sites, shared hubs allow many networks to utilize the

same central ground station for network control. These shared hubs are owned and

operated by the VSAT provider, thus the initial capital outlay costs. For larger networks,

it becomes economical to operate a dedicated hub for networks of between 200-300

nodes [Ref. 9]. Table 4 shows rough cost estimates for a dedicated hub network of 325

remote sites and a shared hub with 100 sites.

D. VSATs AS A BRIDGE BETWEEN LANs

An ideal VSAT application is linking the various LANs in a widely spread

organization. For even moderately sized corporate networks, VSATs can be a viable

alternative to terrestrial links. Figure 9 shows a network that links two LANs in a star

topology. Within this physical framework, a logical architecture that supports the

communication process resides. We will look at an architecture that is specified by using

the systems of communicating machines model. We will deal with CSMA/CD LANs as

this is the most frequently used LAN. An SCM specification for the CSMA/CD LAN

[Ref. 7], can be used as one of the components of the bridge. Because all communication

between machines is done through shared variables, other LAN standards can be easily

linked using the same logical architecture. Figure 10 illustrates the logical relationships

between machines and variables for the two LAN network of Figure 9.

32

Page 39: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

TABLE 4: COST ESTIMATES FOR TWO VSAT NETWORKS. SOURCE: [Ref. 91

Dedicated Hub Lease Rate: 2.00% Term: 5 yr 325 Sites

Item Unit Cost Quantity Cost/mo. Cost/mo./siteVSATEquipment $10,800 325 $70,200Installation $3,400 325 $22,100Maintenance $65 /VSAT/mo. 325 $21,125HUBEquip. & Inst. $1,300,000 1 $26,000Maintenance $7,500 /mo. 1 $7,500SATELLITE $15,150 /mo. 1 $15,150TOTAL $162,075 $499Operating Costs $43,775 $135

Shared Hub Lease Rate: 2.00% Term: 5 yr 100 Sites

Item Unit Cost Quantity Cost/mo. Cost/mo./siteVSATEquipment $11,000 100 $22,000Installation $3,600 100 $7,200Maintenance $65 /VSAT/mo. 100 $6,500HUB SERVICES $9,200BACKHAUL $2,600TOTAL $47,500 $475Operating Costs $18,300 $183

1. Logical Composition of the VSAT

The VSAT on each of the LANs is composed of six separate finite state

machines along with variables that allow them to communicate. In order to function on

the CSMA/CD network, there is a CSMA/CD node. This machine is identical to the

SCM specification in Chapter II. The variables inbuf and msg are now shared with a

another machine, bridge.

33

Page 40: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

/

/ E

cz

Cn2

34

Page 41: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

72:

.. ... .

. ... ..

............. . . . . . . . . . . .

..........

........-

. . . . . ...............

. . . . . . . . .. . . . . . . . . .. . .

.......... . . . . . .. .

. . . .. . .. . .

.. . .. . . . . . . . . . .

. . . . . . . . . . . .

.........

. . . . . . ......

.... ... .. ... 0

Cc)

35

Page 42: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

The bridge is responsible for stripping any CSMA/CD MAC layer information

that does not need to be sent and replacing that information on incoming traffic. It

communicates with the next machine, buffer, via the variables send and rec. Bridge

software is commonly available.

The buffer is responsible for managing the incoming and outgoing buffers in the

VSAT. Outgoing traffic is buffered until a space is available in the queue for

transmission. Incoming traffic is buffered until the bridge is ready to handle it. Since

the CSMA/CD protocol does not have a built in priority scheme, this machine may be

used to impose priorities on traffic. For example, network management may wish to

have traffic from address A or to address X take priority over all other traffic. If this

functionality is not desired, then the machine is merely the manager for afirst-in-first-out

(FIFO) queue.

The next three machines, transmit, receive, and FAD function together as the

MAC layer protocol for the VSAT network. These machines will be specified in Chapter

VI of this paper. Figure 11 displays the composition of the VSAT.

2. Logical Composition of Hub

The number of separate machines present in the hub is dependent upon the

number of remote VSATs being supported. It has only one FAD and one set of transmit,

receive, and buffer for every remote VSAT plus one set for the hub itself. The

functioning of these machines is virtually identical to that in the VSATs. The FAD and

receiver must be able to pass traffic to the appropriate transmit/receive pair and buffer,

respectively. Also, a method such as polling must ensure that the FAD "sees" all of the

transmit/receive machines and data is not overwritten before it can be sent.

36

Page 43: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

.0

0

f4-

* it

41

cla d

37-

Page 44: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

IV. SELECTION OF A MEDIUM ACCESS CONTROL PROTOCOL

Medium access protocols allow many users to share a common communications

channel. The protocol must fairly allocate the available resources, either passively or

actively, to the users while maximizing throughput and minimizing delay. Also,

network stability must be maintained at all anticipated traffic loads. If offered load

reaches a saturation point, some method of recovery may be needed to force the network

back into a stable operating region. Time division multiple access (TDMA) protocols

will be focused on because they allow for the simplest growth path for evolving

networks.

There are three general types of TDMA protocols. General TDMA assigns slots

within a time frame to each ground station. Random access protocols allow users to

transmit their message packets without any sort of coordination. Demand assigned

multiple access (DAMA) protocols use either a distributed or centralized reservation

scheme to coordinate users waiting to transmit packets.

A. GENERAL TDMA

TDMA is a technique that allows stations on a network to transmit traffic bursts

during certain slots of a periodic time frame. Slots are synchronized so that bursts from

different earth stations arrive at the satellite closely spaced but without an overlap. The

transponder takes one burst at a time, amplifies it, and retransmits it on the downlink.

Figure 12 is a simplified view of TDMA. [Ref. 10:p. 226]

In order to fine tune the performance of a TDMA network, more than one time slot

in each frame may be assigned to users that typically have large volumes of traffic to

send. While this is not a dynamic process, it may be placed on a time schedule if the

38

Page 45: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

traffic patterns between stations is predictable. For example, if a station is required to

perform large data transfers every morning then it can be assigned several slots in each

frame between the hours of 8 and 10 AM. During other times it would receive only one

slot per frame.

4

400

Figure 12: Time Division Multiple Access Source: [Ref. 10:p. 227]

TDMA is particularly well suited for networks in which the station loads are

moderate to heavy, predictable, and vary slowly over time. Under lightly loaded

conditions, TDMA wastes a large portion of the available bandwidth. A station always

has at least one slot per frame assigned to it even if it has no traffic to send and another

station has a large queue. Also, every time a station is added to or taken off of the

network the frame structure and slot assignments must be changed. In order to better

39

Page 46: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

utilize the bandwidth under such conditions random access or demand assigned

techniques must be used.

B. RANDOM ACCESS PROTOCOLS

Random access protocols, sometimes referred to as contention based protocols, have

no scheduled time for users to transmit nor is there a central agency controlling the

timing of traffic. Each remote station is attached to one or more users who generate

message packets in a random manner. As the message packets arrive at the station, they

are placed in a queue and transmitted first-in-first-out. Because there is no central

controller, collisions occur when data packets from two or more stations overlap in time

at the receiving station. It the job of the protocol to recover from these collisions and

also from errors induced due to channel noise.

In order to make the analysis of the system tractable, the following assumptions are

made:

o All links are equidistant.

o Infinite number of users.

o Packets of equal length T seconds.

o Packets are generated by remote station according to a Poisson process with

average arrival rate of . packets/second.

o Transmission channel is assumed to be error-free.

o ACKs never suffer a collision.

Special notice should be taken of the assumption of a Poisson process. The

Poisson process states that the probability of a single occurrence of an event during an

interval of t seconds is given by e41a. If a remote station is connected to more than one

user, each of which is generating messages according to a Poisson process, then the

40

Page 47: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

transmissions of the station are not Poisson. Also, the Poisson process assumes that the

number of occurrences during one time interval is independent of the number occurring

in any other interval. This is not the case for VSAT systems because the offered load g

of the system is dependent on the generation rate X and also the number of packets

awaiting retransmission.

While the above assumptions clearly do not reflect the physical reality of the system,

they do allow the successful prediction of an upper bound for performance.

[Ref. 12:p. 47-48]

1. ALOHA

ALOHA, shown in Figure 13, is the simplest of all random access protocols.

Packets are simply transmitted by the remote stations as they are created. The receiver

uses an error detection scheme to see if the packet was received uncorrupted. If no error

was found, an acknowledgment is sent. If errors are detected then no acknowledgment is

sent and the originator will attempt to retransmit the packet after a random time-out

interval. In some satellite communications systems using ALOHA, no ACK is returned

by the receiving station because the sender can "hear" his transmission on the satellite

downlink and determine if a collision has occurred. While this would be a better method,

it is not plausible with all VSATs due to their low transmitter power and antenna gain.

If a packet is transmitted at time t, it will be received without collision as long

as no other packet is transmitted during the interval t-T to t+T. The probability of

success P[suc] is therefore the probability that no other packets are transmitted during the

interval 2T. By the Poisson process, the probability that only one packet is generated in

2T seconds is given by:

P[suc] = e-2gT

41

Page 48: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

Where g is the offered load and must be greater than ?, since not every packet is

successfully transmitted on its first attempt.

The throughput S of the system is the fraction of time that useful information is

transmitted. Since P[suc] is the fraction of offered packets that are successful during a

time period, it can be defined as S/gT. Therefore, the throughput of an ALOHA system

is given by:

S = gTe-2 gT

This is usually normalized by the packet transmission time and takes the form:

S = Ge-2G

where G is referred to as the normalized offered load [Ref. 12:p. 49]. Differentiating this

equation and setting to zero, the maximum throughput is found to be S= l/(2e) .18

where G = 1/2.

Partial Collision Complete Collision

HUB _ Time

B F F~1~, Propagation Delay , Transmission Time

Figure 13: ALOHA

The average packet delay for ALOHA networks is the sum of the packet length T,

propagation delay r, and the expected value of the retransmission delay E[Dr]:

Dayg = T + -r + E[Dr]

T and r are known quantities. The value of E[Dr] is dependent upon the type of

retransmission scheme used.

42

Page 49: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

One method for determining the amount of time to wait before retransmission is to

perform a random draw from a uniform probability distribution. If the random

retransmission delay is taken from a uniform distribution with K intervals of T seconds

each, then the average delay before the first retransmission is T(K+I)/2 and the

retransmission delay after r attempts is given by:

D =rt T+ T(K+l)]

If Qr is the probability of a success after r retransmissions, the expected value of r is:

E[r] ; r Qr

r

and so the expected retransmission delay of a packet is:

E[Dr] = E[r](I + T(K21)]

In order to find E[r], an expression for Qr must be determined. Let q be the probability

that a packet is successfully transmitted on its first attempt and q' be the probability that

its is successful for one retransmission event. Qr is therefore:

Qr = (1-q)q'(1-q')r-I for r>1

Substituting this back into the series, E[r] converges to:

-q

Since q is the probability of a newly generated packet being successfully transmitted, it is

merely the Poisson distribution e-2gt. Assuming that q-q', the expected value of r is

found to be:

E[r] Z e2gt- I

The expected retransmission delay is thus:

E[Dr] = (e2gt- 1)I + T(2 1)]

and therefore the average packet delay is:

43

Page 50: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

Davg =T + c + (e2gt-1) + T(K+I)] K>>l

The actual value of Davg does not change greatly for values of K between 10 and 50 so

the choice of K is not critical [Ref. 10:p. 364-366]. This equation can be normalized by

the packet time and becomes:

Dang.- 1 + a + (e2G-1)[a + (K+1] K>>1

2. S-ALOHA

Slotted ALOHA, Figure 14, is a modification of pure ALOHA in which packets

can only be sent at discrete times called slots. The length of a slot is the packet size

converted to seconds (the reciprocal of the bit rate times the number of bits in a packet).

A central clock keeps all stations synchronized to ensure that packets arrive at the

receiver only at the beginning of a slot. Because all packets must begin on a boundiary, a

packet will be successfully transmitted if it was the only packet scheduled for

transmission during the previous slot. Thus:

S = gTe-gT or normalized: S = Ge-G

Differentiating this shows that the maximum throughput is S = Ile -. 36 and occurs when

G = 1. [Ref. 12:p. 50]

The derivation of packet delay is similar to that for pure ALOHA except that there is

an additional delay of T/2 before a packet may be transmitted since the sender must wait

for the beginning of a slot. This applies to both the original transmission and all

subsequent retransmissions. With this additional factor the average packet delay

becomes:

Davg -2- +,r + (e2gt-1) [ + 2+] K>>l [Ref. 10:p. 366]

Normalizing by packet time we have:

44

Page 51: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

Davg + a + (e2G-1) a + (K1) K>>1

A2 2l A2 A

HUB A I BIFA3 0 Time

Figure 14: S-ALOHA

3. SREJ-ALOHA

Selective Reject ALOHA attempts to increase throughput on a random access

channel without the implementation difficulties caused by using time slots. Variable

length messages are sub-packetized and then transmitted in an unslotted manner. As

collisions occur, the receiver rejects the corrupted sub-packets. These sub-packets are

then retransmitted by the senders. Figure 15 shows the functioning of SREJ-ALOHA.

[Ref. 13:p. 3141

Selective Reject ALOHA has a throughput that is comparable to that of

S-ALOHA but without the requirement for synchronization across the network.

Messages are not forced into fixed size packets for transmission. Instead, each message

is divided into smaller sub-packets and then transmitted as a continuous burst. Since

most collisions result in only a partial overlap, only the few sub-packets that were

corrupted would need to be retransmitted.

This type of strategy has several advantages over S-ALOHA. It does not

require the additional complexity of timing coordination so implementation cost could be

lower. Also, the performance could possibly be better than that of S-ALOHA because it

does not have the overhead caused by forcing the traffic into fixed length bursts. Actual

45

Page 52: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

throughput of SREJ systems is in the range of .2 to .3 due to the need for acquisition

preamble and header in each sub-packet. [Ref. 14:p. 37]

Retrans Msg A

HUB A A2 A3 FA4 I T1B2F. TimeRetrans Msg B

B FBI B2] B1 B2]

Figure 15: SREJ-ALOHA

An additional modification may be made to the SREJ-ALOHA protocol that

increases its maximum useful throughput to .4 -.45 . SREJ-ALOHA/FCFS uses a

time-of-arrival "first-come-first-served" method to resolve collisions. Returned

acknowledgments are monitored by all stations on the network. When collisions have

occurred, an interval of time is reserved exclusively for the retransmission of the

corrupted packets. The message that began arriving first would be retransmitted first.

For example, messages A and B each contain three sub-packets (A1, A2, A3 and B 1, B2,

B3) and are transmitted such that Al arrives correctly; A2, A3, BI, and B3 overlap and

are indecipherable; and B3 arrives correctly. The order and content of the returned

acknowledgments would allow all stations to know that the first sub-packet of three part

message A was received correctly before message B interfered. The last sub-packet of

three part message B was then received. The ordering is used to set up a retransmission

interval, with A first and B second, after a prespecified delay relative to a mutually

observed channel event. Because all stations received the channel feedback, other

stations are able to avoid transmitting during this period guaranteeing a conflict-free

retransmission. [Ref. 15:p. 435-438]

46

Page 53: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

4. Instability of ALOHA Protocols

All of the ALOHA family of protocols are unstable when faced with large

variations in offered load. As G increases, so does S until the maximum is reached.

Beyond this point, throughput decreases while offered load continues to increase. If S is

then less than X, the system will drift further until S eventually reaches zero.

This is true for any ALOHA system using fixed retransmission probabilities.

Schemes exist to stabilize ALOHA systems by adapting the retransmission probabilities

by recursive algorithms in order to reflect the state of the system. These schemes are

difficult to implement and only offer to increase stable throughput to S = Ile for the pure

ALOHA case. [Ref. 12:p. 70]

C. DAMA

DAMA protocols allow users to reserve slots in a time division multiple access

(TDMA) frame for their use. This can be done by either requesting slots from a central

host or by preemptively transmitting in slots that were empty during the previous frame.

Reservation schemes minimize the contention for channel resources and greatly enhance

the overall stability of the network. They offer potentially higher throughput, especially

for messages, but at the cost of increased delay. Also, they require additional complexity

in the system hardware, but could be worth the cost for some traffic loads.

1. Decentralized Schemes

In decentralized schemes, reservations are implicit. Successfully transmitting in

some slot reserves a corresponding slot in a later frame for that stations use. These

methods require a station to hear its own broadcast on the downlink. Two decentralized

protocols that are suitable for VSAT networks are discussed here.

47

Page 54: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

a) R-ALOHA

With R-ALOHA, a station monitors all slots in the current frame. Any

slot that is empty or contains a collision is available for use in the following frame and is

contended for using S-ALOHA. Successfully transmitting in that slot reserves the

corresponding slot in subsequent frames for that station's use for as long as it has traffic.

[Ref. 4:p. 318]

Performance of R-ALOHA can be worse than that of S-ALOHA if traffic

is very bursty due to the fact that after a transmission is completed, the slot must remain

empty for one frame before it can be utilized again. Fairness is also a problem with this

protocol. Once a station manages to capture slots it can hold them indefinitely,

monopolizing the circuit. [Ref. 4:p. 319]

b) Robert's Scheme

Robert's scheme divides the first slot of every frame into "minislots."

Users contend for the minislots using S-ALOHA by sending a request packet that

contains the number of slots per frame it desires. If this is successful, it determines the

slots it has reserved and transmits its data. Throughput of this protocol is significantly

better than that of S-ALOHA, though delay is somewhat greater. [Ref. 4:p. 320]

c) CPODA

Contention Priority Oriented Demand Assignment is similar to Robert's

scheme with the differentiation of data and reservation slots. The difference here is that

the boundary between the two types may be varied with system load. This ability allows

the protocol to handle both stream and bursty traffic. Stations are also allowed to reserve

future slots by setting flag bits in their current data slots, so heavy users will not need to

contend for the next reservation minislot. Reservations can be made for a single frame or

for a series of frames depending on the data type. [Ref. 3:p. 1811

48

Page 55: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

While this protocol is decentralized for the scheduling of packets, some

form of central control is necessary in order to change the frame structure. The

controlling node would be responsible for monitoring the state of the network and

adjusting the number of data and minislots to optimize throughput and/or delay.

d) ARRA

Announced Retransmission Random Access is a different twist on

reservation protocols. Instead of using minislots to reserve a slot prior to transmitting

data, the station transmits and then reserves a future slot for retransmission if a collision

occurs. Because a packet may be transmitted without first reserving a slot, in lightly

loaded networks this protocol has a much lower average delay than other reservation

protocols. [Ref. 3:p. 181]

2. Centralized Schemes

These protocols use a central agency to allocate channel resources. Centralized

control allows the frame structure to be dynamic so these techniques are well suited to

mixtures of both stream and bursty traffic. These schemes potentially offer the highest

throughput. Two techniques are commonly used for packet communication.

a) FPODA

Fixed priority oriented demand assignment is a technique that is used to

connect six LANs scattered throughout the United Kingdom. Each frame begins with a

series of 100 byte long minislots each assigned to a particular LAN. These are used to

either transmit data or to make reservations. Reservations can be made for three levels of

priority: priority, normal, or bulk. These reservations are used by a master control

station to divide the remainder of the frame into from one to six variable length slots,

again with each slot assigned to a particular station. This protocol is very effective where

there is a small, fixed number of stations using the network. [Ref. 4:p. 320-322]

49

Page 56: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

b) PDAMA

Packet-demand assigned multiple access (PDAMA) was developed for

NASA's mobile satellite system, handling voice and data communications to mobile users

throughout a wide area. The PDAMA frame begins with a leader control slot,

transmitted by the master station, that contains acknowledgments of received reservations

and slot assignments. This is followed by a guard slot of 280 ms that allows stations to

determine their slant range to the satellite by transmitting a tone. The next section of the

frame is a set of reservation minislots that are contended for using S-ALOHA.

Reservations may be made for one slot at a time; long message mode, which allocates the

entire information subframe to a station until its transmission is completed or it is

preempted for higher priority traffic by the master station; or digitized voice

conversations. The information subframe is of variable length and is allocated by the

master station based upon a prioritized queue of all received reservations.

D. SELECTING AN ACCESS PROTOCOL

There are no hard and fast rules for selecting an access protocol for a VSAT

network. The system designer must balance performance parameters such as throughput

and delay against present costs and anticipated expansion plans.

The primary consideration in the selection of an access protocol is the nature of the

traffic that is anticipated. If a VSAT is being used to relay transactions from an ATM, its

packet sizes, message generation rates, and required minimum delay time will be

substantially different than that of a VSAT network that is being used by a corporation to

transmit inventory, accounting, and personnel data. This leads to some rules of thumb

that can be used in the selection of an access protocol.

Networks whose primary traffic is "bursty" and which do not require high channel

utilization are well suited to contention algorithms such as the ALOHA family.

50

Page 57: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

Examples of this type of application would be credit card approval and bank ATMs. As

long as the offered load remains low, then the probability that a collision occurs between

two or more packets is small. As system load increases, then performance decreases

dramatically. An additional benefit of this type of access scheme is that round trip delay

is low. This is especially important in systems like the above examples where there is a

customer waiting on the results.

Networks that are primarily used to pass business data such as inventory and

accounting information require high channel utilization since each message is potentially

thousands of packets long. For these networks, a TDMA scheme is the best choice. This

allows each of the VSATs to have a guarantied amount of access time to the uplink,

eliminating the need to contend for this resource. The amount of time given to each

VSAT can be equal or skewed towards the heavy users. While the allocation of channel

slots is not dynamic, it is possible to vary the time slices in some predetermined fashion.

In this way stations that have large amounts of data to pass at certain times of day can be

given larger access blocks during those times. As new stations are added to the network,

slot assignments for all stations are modified by the hub.

For networks that have a mixture of traffic types or a varying number of VSATs

connected, a DAMA access scheme is needed to allow efficient channel utilization.

These schemes force VSATs to reserve time slots, either implicitly or explicitly, before

they transmit their data. This requirement significantly adds to the overhead on the

channel. Even so, DAMA is the only alternative for non-deterministic traffic that

requires high utilization.

51

Page 58: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

E. MAC PROTOCOL SELECTED

A generalized TDMA protocol is recommended as the medium access method. The

nature of the traffic traveling between LANs was the prime consideration in its selection.

Approximately 80 percent of the traffic on a VSAT net is estimated to be bulk traffic

such as electronic mail, spreadsheets, and other such documents [Ref. 10:p. 597].

Random access techniques are undesirable in this case because the length of bulk

transmissions may cause many collisions, increasing delay and possibly pushing the

protocol into an unstable operating region. It was also felt that transmissions from the

VSATs would not be "bursty." Bursty users have long periods of time, relative to the

typical message length, between transmissions. For interconnected LANs in a corporate

network there would most likely be some level of offered load for a VSAT most of the

time. Because the channel would be in almost constant use, DAMA protocols are

unnecessary. Several other factors were also considered:

o The network topology should be fairly stable so a protocol that automatically

handles the addition/removal of stations is not needed.

o Traffic volume should be predictable from historical data so slot assignments

within the TDMA frame may be tailored.

o Real time response was not a critical requirement.

o TDMA is easily implemented and allows for network growth.

Once a method for accessing the satellite channel is selected, the remainder of the

data link layer functions must be implemented. This may be done through the rse of a

sliding window protocol, explained in Chapter V. This protocol is a point-to-point

protocol that is used on top of the TDMA link. The following chapter will present a

specification and analysis for a selective repeat, sliding window protocol using TDMA.

52

Page 59: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

V. SPECIFICATION AND ANALYSIS OF A SELECTIVE REPEATPROTOCOL

In the previous chapter a TDMA protocol was chosen to accomplish medium access

on the VSAT link. It allows all stations on the network to share the communication

medium without conflict, but it does not provide any other services required of the data

link layer such as error control and point-to-point flow control. In order to accomplish

this another protocol must be used in conjunction with the TDMA channel.

A sliding window protocol allows a transmitter to send multiple packets without

waiting for an acknowledgment. The "window" limits the number of frames that may be

sent at any time. As a packet is sent the window closes by one. When and

acknowledgment (ACK) is received, the window opens back up by one. Packets are

assigned sequence numbers to keep track of which ones are sent and acknowledged. The

sliding window protocol also must have a means of requesting retransmission of packets

that are received in error. There are two methods of accomplishing this: go-back-N and

selective repeat. Figure 16 demonstrates their operation.

If a packet is received in error with a go-back-N protocol, the receiver sends a

negative acknowledgment (NAK). It discards all incoming packets until the packet in

error is received correctly. The sender is thus required to retransmit all outstanding

packets once a negative acknowledgment has been received. On a satellite link the one-

way propagation delay is approximately 270 ms. In order to get the best utilization from

the channel, the window size must be large enough to allow an ACK for the first packet

to be received before the last packet in the window is sent and so must be at least .54

seconds. If the system is operating with a full window, then .54 seconds of data must be

53

Page 60: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

retransmitted when an error occurs. At a data rate of 56 kbps this would equate to 3780

bytes of data. [Ref. 4:p. 141-1431

[]F-01 0 E D D D Efl 0 E El E D

Error Discarded frames

(a) Go-back-N

I N V

Error DBuffered Frames 2-5

by receiver released(b) Selective report

Figure 16: Go-back-N and Selective Repeat AcknowledgmentSchemes.

Source: [Ref. 4:p. 1441

A selective repeat protocol requires that only those packets received in error be

retransmitted. Once a NAK for a corrupt packet has been sent, the receiver continues to

acknowledge subsequent packets. These packets are placed in a buffer until the packet

received in error is received correctly. The selective repeat protocol offers more efficient

utilization of the channel, but this comes at the cost of more complex logic at both

receiver and transmitter and larger buffer requirements at the receiver. These are far

outweighed by the benefits gained. The remainder of this chapter will present the formal

specification and analysis of a sliding window, selective repeat protocol. A high level

data link control (HDLC) frame will be used for transmission across he VSAT link.

[Ref. 4:p. 143-144]

54

Page 61: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

A. SPECIFICATION

The specification for the selective repeat protocol consists of finite state machines

for the three entities within the shaded area of Figure 11, their shared and local variables,

and their predicate-action tables. Each machine is a graph representing the functioning

of an entity within the protocol. The nodes on the graphs are "states" and the arcs

connecting them are transitions between the states. The transition taken is determined

from the predicate-action table for the corresponding machine. A transition may only be

taken if its "predicate," which is determined from the contents of both local and shared

variables, is true. Local variables are used by machines to keep track of internal

information while shared variables are a means of communication between the processes.

If a transition is enabled, then the "action" given by the table is performed and the state

of the machines is changed to the next node.

1. Transmitter

Figure 17 and Table 5 are the SCM specification of the selective repeat

transmitter with a window size of 3. The finite state machine of the transmitter may be

generalized as shown in Figure 16 for a window size of N.

The transmit machine's initial state is 0. As the buffer manager places data in

the next available sequence number, the transmitter takes the packet, passes it to the

FAD, sets a packet timer, and increments the index for the next packet to be transmitted.

As long as the next packet is not empty, the transmitter will continue this process until

the bottom state on the finite state machine is reached, indicating transmission of a full

window.

Acknowledgment (ACK) and negative acknowledgments (NAK) are passed

from the FAD to the transmitter as they are received. If an ACK is received then the

transmitter must determine if the window may be opened and if so, how far. If the ACK

55

Page 62: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

is not for the first packet in the window then the flag ACKREC0 is set, indicating that

the packet was received correctly. The window is not advanced because packets that

were transmitted earlier are still outstanding. The sequence number within each ACK

and NAK represents the actual sequence number of the packet received and no the

sequence number of the next expected packet, as is common in many protocols.

When an ACK for the first packet in the window is received the machine clears

its buffer, advances the window, and looks at the next sequence number. If the packet

has not been received, ACKREC) = FALSE, then that becomes the beginning of the

window. If it has been received then the next sequence number is examined until the

earliest outstanding packet is found or the window is fully opened. If a NAK is received

for a packet or the timer expires, indicating that the packet was lost, then the transmitter

is allowed to retransmit that packet. ACKs or NAKs that do not correspond to any of the

sequence numbers within the current window are ignored.

56

Page 63: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

0

R(I) +N(m - m I

-V(i)

(I +A~s -DOm

2A.. 2 A(m) or,C(x)

3A (1 +A(s)3 +A(m) or +C(x)

Figure 17: FSM for Selective Repeat Transmitter, Window Size = 3.

57

Page 64: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

TABLE 5: PREDICATE-ACTION TABLE FOR SELECTIVE REPEATTRANSMITTER

TRANSITION PREDICATE I ACTION-D(i) OUT_BUFFER(i) # 0 DATA_OUT<--OUTBUFFER(i);

SET TIMER(i);.___i:= i+l;

+A(m) CONTROLIN = ACK(m) A ACK_REC(m) := TRUE;is < m < i; DEL CONTROLIN;

+A(s) CONTROLIN = ACK(s) A W := 0;s=is; while(is<i A ACKREC(is)=TRUE)

DEL OUTBUFFER(is);ACKREC(is) := FALSE;

is:= is+l;W:= W+1;

DEL CONTROLJIN;R(W) W = 1..WINDOWSIZE

+N(m) is <= m <i; DEL CONTROL-IN;CONTROLIN = NAK(m) orTIMER(m) expires

-D(m) DATAOUT <-- OUT-BUFFER(m);+C(x) CONTROL_IN = ACK(x) or DEL CONTROLIN;

CONTROLIN = NAK(x);X < is or x => i;

TRANSMIT VARIABLESi - Next packet to be sent. Local variable.is - Start of transmit window. Local variable.m - Any valid ACK number.x - Any invalid ACK or NAK number.CONTROLIN - Control field from incoming data packets. Shared with FAD.TIMER() - Array of timers set for packets as they are sent. Local variable.ACKRECO - Array of booleans set to TRUE when ACK is received for a packet.

Local variable.OUTBUFFER0 - Array of outgoing data packets. Shared with buffer.DATA_OUT - Variable used to pass outgoing data to FAD.W - Counts the number of frames that is has advanced.WINDOWSIZE - Max number of outstanding frames allowed. Implicit in FSM.

58

Page 65: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

0

-D(i)R( 2 .-

+A(s) _ D(m)

2A 2 +A(m) or +C(x)

Figure 18: FSM for Selective Repeat Transmitter, WindovtSize =

2. Receiver

The specification for the selective repeat receiver is given by Figure 19 and

Table 6. The initial state of the receiving machine is 0. Any packets that are received

with sequence numbers outside of the window, +D(x) transition, are dropped. If a

corrupted packet is received then the +B(i) transition sends a NAK for that sequence

number. If a valid data packet is received then either the +D(n) or +D(i) transition is

taken, based upon whether the sequence number of the received packet is equal to is. If

the sequence number is not is then the flag PKTREC is set to TRUE and the packet is

59

Page 66: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

stored. If it is equal to is, then the PKTREC is set, the packet is released to buffer, and

is is incremented until a sequence number with PKTREC=FALSE is found.

+D~i) DATAN # e nme +Bi IUFRi AAI_____________ ________ _____ __ _ _ K Ri) = TR E-A ~ ~-i)n COTRLOU -- AK))

whiA~i=i A PKT_ ECii

TRUE

RELENBIVEER)

PKT_REC(i) := FALE;

-N(i) CONTROL-OUT <-- NAK(i);

+D~~~~~~n)~~E DATI #0 A eqnmbr FENBUFE~) )DTAN____________ A i< ~PKTREC() := TRUE;

-A(n) ---- CONTROL-OUT <-- AK(n);

+D(x) DATAIN#OA seq numberx <i

REEEAIALESi - Expected packet. Start of receive window.n - Any sequence number in window other than i.

60

Page 67: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

x - Any sequence number not in window.ie - i+WINDOWSIZEINBUFFER0 - Array of frames to hoid incoming data packets until they can be

released to buffer. Equal in number to window size.PKTREC0 - Array of booleans set to TRUE when a packet is received.DATAIN - Variable used to pass incoming data from FAD to receiver.CONTROLOUT - Variable used to pass ACKs and NAKs to FAD.

3. Frame Assembler-Disassembler

The FAD is a machine that takes control information from the receiver and data

packets from the transmitter, encapsulates them into an data frame such as HDLC, and

sends them across the VSAT link. At the receive side the FAD extracts the incoming

control information and passes it to the transmitter and passes the entire frame to the

receiver. The logical communication within the protocol is between the transmitter and

receiver machines. If the FAD is assumed to be reliable in that it always forwards

information to the appropriate entity, its functioning is does not impact on the

appropriateness of the protocol. The FAD, therefore, will not specified by this paper.

B. ANALYSIS

A common form of analysis for communications protocols is reachability analysis.

This is a graphical analysis which examines every possible system state. A system state

is a node on the graph defined by the state of the two communicating machines and the

contents of the communication channels. Each state consists of the set (T,D,C,R) where

T is the state of the transmit FSM, D is the contents of the channei from sender to

receiver, C is the contents of the channel from receiver to sender, and R is the state of the

receiving FSM. The arcs on the graph are all transitions that may be taken from a given

state. If the protocol is functioning properly it should be free from dead'ick. A

deadlocked state is one from which the protocol can not proceed. Once in a deadlockeu

state the p-otocol will remain there indefinitely.

61

Page 68: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

A reachability analysis for a window size of 3 was performed and is given in Figure

20. Two assumptions were made for this analysis: all packets are received without

errors, packets may not be lost or re-ordered during transmission. Within this graph D

represents a data packet from sender to receiver while A represents an acknowledgment.

The assumption that packets in the channel cannot be lost or re-ordered eliminates the

need to keep track of which specific packet or acknowledgmentit is representing. Figure

20 shows that under these assumptions the protocol is free from deadlock.

For even the simple case of a window size of 3 and error-free transmission there are

25 states within the reachability analysis. By the symmetry of the diagram, it can be

shown that for any given window size N the number of states in the error-free analysis is

given by: N2 +(N+ 1)2

Obviously, full analysis of protocols using reachability diagrams becomes unwieldy for

all but the simplest of cases.

A further analysis of this protocol was performed for a window size of 3 using the

assumptions that no packets may be lost, only the first packet in a transmission window

is corrupted, ACKs and NAKs are always correct, and all retransmitted packets are

received correctly. This analysis, shown in Figures 21a and 21b, contains 65 states. Of

these, 8 are duplicated in Figure 20.

By combining Figures 20 and 21, an analysis under the assumptions that only one

packet in any window may be corrupted, no packets may be lost, ACKs and NAKs are

always correct, and retransmitted packets are always received correctly. The protocol

follows the states in Figure 20 until the corrupted packet is the first one in the window.

At this point the protocol is one of the states in the far left column. These states map to

states in the left column of Figure 21a. When the corrupt packet is received, one of the

62

Page 69: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

+BO transitions is taken and the protocol moves into Figure 21. Under these assumptions

the protocol again is free from deadlock.

Due to the combinatorial explosion of states, another method must be used if a

protocol is to be proved free from deadlock under all conditions. The development of an

analytical method to prove the correctness of any protocol has been the subject of much

work. The validity of many protocols may still only be "proved" by induction or through

exhaustive computer simulation.

63

Page 70: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

- 0

,<,3

it

_ H

-01-- ,low

645

/ , II , i

I - -'7 I '

.- - 0

Al 'LI4

Page 71: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

.4 4

C - C

65 *

Page 72: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

66

Page 73: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

VI. CONCLUSIONS

In this thesis, an architecture for a VSAT-based LAN bridge was proposed. The

bridge was specified using the systems of communicating machines model, and partially

analyzed. This architecture specifies that entities within the VSAT network

communicate via reads and writes to shared variables. The use of shared variables

essentially isolates each entity from the internal functioning of other entities with which

it must communicate. CSMA/CD LANs are currently the most widely used LAN

protocols, therefore a CSMA/CD LAN was used in the specification of this network

architecture. The use of SCM for the specification of the VSAT network architecture

should enhance the ability of developers to implement VSAT-based bridges for other

LAN standards.

Time division multiple access (TDMA) was chosen as the medium access method

for a VSAT-based LAN network. Inter-LAN traffic is estimated to consist mostly of

bulk transfers such as data files and E-mail. This type of traffic does not lend itself to the

use of random access protocols. Also, it was estimated that each VSAT node would have

a traffic to send most of the time and so DAMA protocols would be inappropriate. The

use of TDMA -Ilows access to the channel to be tailored to the nature of the inter-LAN

traffic during given periods of time, is easily implemented, and may be easily modified

to meet the demands of a growing network.

A selective repeat, sliding window protocol for use in conjunction with the TDMA

link was formally specified using the SCM model. A selective repeat, as opposed a go-

back-N, protocol was chosen due to its more efficient use of channel capacity across an

error-prone channel with a long propagation delay. The two primary entities within the

67

Page 74: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

selective repeat specification are the transmitter, and the receiver. Each of these entities

are defined by a set of variables, a predicate-action table, and a finite state machine. The

specification of the protocol was shown for a window size of 3 and extended to an

arbitrary window size of N.

A limited reachability analysis for this protocol specification was shown. The

protocol was proved to be free from deadlock if the channel is assumed to be error-free.

A further reachability analysis was performed under the assumptions that only the first

packet of a window would be received in error and all retransmitted packets were

received correctly. For this case the protocol was also free from deadlock. The two

analysis were combined and resoning presented to show the correctness of the protocol

when any one packet within the window was corrupted. A full reachability analysis of

the protocol was infeasible due to the combinatorial explosion of states.

Further work in this area is needed specifying the VSAT bridge for other LAN

standards. Complete analysis of this protucol specification should be performed. Also,

study of the possibility of connecting high speed networks such as FDDI via VSATs is

needed.

68

Page 75: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

REFERENCES

1. School of Information and Computer Science, Georgia Institute of Technology,Technical Report GIT-88/12, Specification and Analysis of a General DataTransfer Protocol, by G. M. Lundy and R. E. Miller, 1988.

2. Stanley, W. D., Electronic Communications Systems, Prentice-Hall, Inc., 1982.

3. Tanenbaum, A. S., Computer Networks, 2d ed., Prentice-Hall, Inc., 1988.

4. Stallings, W., Data and Computer Communications, 2d ed., Macmillan PublishingCompany, 1988.

5. Freeman, R. L., Telecommunication Transmission Handbook, 2d ed., John Wiley &Sons, Inc., 1981.

6. Institute of Electrical and Electronic Engineers, Standard 802.3-1985, CarrierSense Multiple Access with Collision Detection (CSMA/CD) Access Method andPhysical Layer Specification, 1985.

7. Lundy, G. M., and Miller, R. E., "Analyzing a CSMA/CD Protocol Through aSystems of Communicating Machines Specification," to appear in IEEETransactions on Communications.

8. Morgan, W. L., and Gordon, G. D., Communications Satellite Handbook, JohnWiley & Sons, Inc., 1989.

9. Briefing book and notes provided to the author by Patrice Louie of HughesAircraft, 22 Feb. 1991.

10. Ha, Tri T., Digital Satellite Communications, 2d ed., McGraw-Hill, Inc., 1990.

11. Derfler, F. J., and Maxwell, K., "The Media Moves The Message," PC Magazine,v. 10 no. 15, pp. 351-374, 10 September 1991.

12. Rom, R., and Sidi, M., Multiple Access Protocols Performance and Analysis,Springer-Verlag New York, Inc., 1990.

13. Raychaudhuri, D., and others, "Design and Implementation of the SREJ-ALOHAAccess Protocol for VSAT Data Networks," International Journal of SatelliteCommunications, v. 8, pp. 313-321, 1990.

69

Page 76: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

14. Raychaudhuri, D., and Joseph, K., "Channel Access Protocols for Ku-band VSATNetworks: A Comparative Evaluation," IEEE Communications Magazine, v. 26 no.5, pp. 34-44, May 1988.

15. Raychaudhuri, D., "Selective Reject ALOHA/FCFS: An Advanced VSAT ChannelAccess Protocol," International Journal of Satellite Communications, v. 7, pp.435-447, 1989.

b

70

Page 77: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

BIBLIOGRAPHY

Agrawal, Brij N., Design of Geosynchronous Spacecraft, Prentice-Hall, Inc., 1986.

Chakraborty, D., "VSAT Communications Networks-An Overview," IEEECommunications Magazine, v. 26 no. 5, pp. 10-23, May 1988.

Dattakumar, M. C., and McCloskey, J. S., "VSAT Networks: Architectures, Protocols,and Management," IEEE Communications Magazine, v. 26 no. 7, pp. 28-38, July 1988.

GTE Laboratories Communication and Network Theory Department Technical NoteTN86-499.1, Modeling and Analysis of Data Link Protocols, by G. M. Lundy, Jan. 1986.

Holzmann, Gerard. J., Design and Validation of Computer Protocols, Prentice-Hall, Inc.,1991.

Lam, Simon S., "Satellite Packet Communication-Multiple Access Protocols andPerformance," IEEE Transactions on Communications, v. COM-27 no. 10, pp. 1456-1466, Oct. 1979.

Lundy, G. M., and Miller, R. E., "Specification and Analysis of a Data Transfer ProtocolUsing Systems of Communicating Machines," to appear in Distributed Computing.

Raychaudhuri, Dipankar, "Announced Retransmission Random Access Protocols," IEEETransactions on Communications, v. COM-33 no. 11, pp. 1183-1190, Nov. 1985.

Stratigos, J., and Mahindru, R., "Packet Switch Architectures and User ProtocolInterfaces for VSAT Networks," IEEE Communications Magazine, v. 26 no. 7, pp. 39-47, July 1988.

Vaman, D. R., and Kumar, S., "Performance Analysis of a Multiple TransmissionProtocol for VSAT Networks," International Journal of Satellite Communications, v. 8,pp. 307-312, 1990.

Wolejsza, C. J., and others, "Multiple Access Protocols for Data Communications viaVSAT Networks," IEEE Communications Magazine, v. 25 no. 7, pp. 30-37, July 1987.

71

Page 78: NAVAL POSTGRADUATE SCHOOL Monterey, California · The architecture of a VSAT node consists of the entities node, bridge, buffer, transmitter, receiver, and frame assembler/disassembler

INITIAL DISTRIBUTION LIST

1. Defense Technical Information Center 2Cameron StationAlexandria, Va. 22304-6145

2. library, Code 0142 2Naval Postgraduate SchoolMonterey, Ca. 93943-5022

3. Commandant of the Marine CorpsCode TE 06Headquarters, U.S. Marine CorpsWashington, D.C. 20380-0001

4. G.M. Lundy, Code 52 3Naval Postgraduate SchoolMonterey, Ca. 93943-5022

5. Tri T. Ha, Code 62 2Naval Postgraduate SchoolMonterey, Ca. 93943-5022

6. Patrice Louie 2Hughes Aircraft CompanySpace and Communications GroupBuilding $64/B435P.O. Box 80002Los Angeles, Ca. 90008

7. Capt. Eugene S. Benvenutti 375 Larkwood Ct.Stafford, Va. 22554

72